Articles tagged with: security

The Convergence of AI and Cybersecurity

Are Artificial Intelligence (AI) and related technologies going to ultimately help us or harm us? It’s a question being debated across news cycles and behind closed doors on Capital Hill as AI technologies continue to be developed and implemented at an unprecedented rate, with little legislation, controls, or governance. And the market is booming. Goldman [ Read More ]

Read More

Multifactor Authentication and why it is important

Many people are seeing more and more services requiring or suggesting the use of multifactor authentication (MFA) for accessing online systems. MFA is a login process that requires multiple methods of authentication to verify a user’s identity. It combines two or more independent credentials to verify a login. The first credential is based on something [ Read More ]

Read More

Why is Cybersecurity Awareness Important?

This article delves into the reasons why cybersecurity awareness is not just an option, but is very important for individuals, organizations, and society. Protection of Personal Data According to the U.S. Federal Trade Commission (FTC), identity theft remains one of the top consumer complaints. In 2020, the FTC received 1.4 million fraud reports, with identity [ Read More ]

Read More

National Cybersecurity Awareness Month 2022: Personal Awareness

Cybersecurity Awareness Month is a great time to reflect on your habits and how you interact with technology over the past year. With this, answers to the following questions can help you focus on keeping your online identity and your data safe. Have you connected to any public Wi-Fi networks over the last year? While [ Read More ]

Read More

National Cybersecurity Awareness Month 2022: Physical Security

National Cybersecurity Awareness Month 2022 provides an opportunity to review a basic yet very important security measure: physical security of our technology and computers. Limiting and preventing physical access to the technology is key to preventing unauthorized access to our computers and data, whether it is personal or university owned. Some offices have barriers, such [ Read More ]

Read More

Don’t Be Held Captive to Ransomware

“$5.9M ransomware attack on major agriculture group poses risk to US grain, pork, chicken supply” Fox Business Sept. 21, 2021 What is Ransomware? Ransomware is a type of malicious attack where attackers encrypt a victim’s data. Ransom is then demanded in exchange for decryption. Hackers often target and threaten to sell or leak sensitive data [ Read More ]

Read More

Using Social Media Safely

It is easy to ignore cyber security, to not take proactive steps and to think “That won’t happen to me.” Many people, however, have learned – after their accounts have been breached, data compromised and, even worse, their identity stolen – it is much easier to take steps to protect yourself before something happens than [ Read More ]

Read More

End of Life (EOL) Are You Safe?

We all know about our software always wanting to install updates. Windows, Office, Adobe, Zoom, and just about any other software we install. At some point your software wants you to install, buy, download, or do an upgrade to a new version. This usually means the previous software versions will no longer be supported, End of Life (EOL). Now, [ Read More ]

Read More

Cybersecurity 2020: Safeguard Your Data

Why should you care? How would you feel if you walked into your office tomorrow and your computer was gone? Does your physical and emotional state worsen if you realize all your data that you accumulated over the years was suddenly ripped out of your hands? Even worse, what if the data now in the [ Read More ]

Read More

Cybersecurity 2020: Phishing

The Federal Trade Commission explains that phishing “is a type of online scam that targets consumers by sending them an e-mail that appears to be from a well-known source.” The message attempts to get you to share valuable personal and sensitive information such as login names and passwords, bank account information or a social security number.    Tips to spot a phishing [ Read More ]

Read More